From 564120b6295745829ad6b5635a7e0834cbe44e3b Mon Sep 17 00:00:00 2001 From: Nick Larsen Date: Mon, 16 Mar 2026 11:03:46 +0100 Subject: [PATCH] chore: Release 26.3.0-rc1 Signed-off-by: Nick Larsen --- CHANGELOG.md | 2 ++ Cargo.lock | 12 +++++------ Cargo.nix | 12 +++++------ Cargo.toml | 2 +- deploy/helm/secret-operator/Chart.yaml | 4 ++-- docs/antora.yml | 3 ++- extra/crds.yaml | 30 +++++++++++++------------- rust/cert-tools/Cargo.toml | 2 +- tests/release.yaml | 6 +++--- 9 files changed, 38 insertions(+), 35 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index a8de145f..8224f336 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -4,6 +4,8 @@ All notable changes to this project will be documented in this file. ## [Unreleased] +## [26.3.0-rc1] - 2026-03-16 + ### Changed - Bump stackable-operator to 0.108.0, strum to 0.28, snafu to 0.9, and ldap3 to 0.12 ([#685], [#688]). diff --git a/Cargo.lock b/Cargo.lock index 1392b60b..50b9ab61 100644 --- a/Cargo.lock +++ b/Cargo.lock @@ -358,7 +358,7 @@ dependencies = [ [[package]] name = "cert-tools" -version = "0.1.1" +version = "26.3.0-rc1" dependencies = [ "built", "clap", @@ -2383,7 +2383,7 @@ dependencies = [ [[package]] name = "p12" -version = "0.0.0-dev" +version = "26.3.0-rc1" dependencies = [ "cbc", "cipher", @@ -3476,7 +3476,7 @@ dependencies = [ [[package]] name = "stackable-krb5-provision-keytab" -version = "0.0.0-dev" +version = "26.3.0-rc1" dependencies = [ "byteorder", "futures 0.3.32", @@ -3546,7 +3546,7 @@ dependencies = [ [[package]] name = "stackable-secret-operator" -version = "0.0.0-dev" +version = "26.3.0-rc1" dependencies = [ "anyhow", "async-trait", @@ -3588,7 +3588,7 @@ dependencies = [ [[package]] name = "stackable-secret-operator-olm-deployer" -version = "0.0.0-dev" +version = "26.3.0-rc1" dependencies = [ "anyhow", "built", @@ -3604,7 +3604,7 @@ dependencies = [ [[package]] name = "stackable-secret-operator-utils" -version = "0.0.0-dev" +version = "26.3.0-rc1" dependencies = [ "anyhow", "openssl", diff --git a/Cargo.nix b/Cargo.nix index 41fb7218..24dda2da 100644 --- a/Cargo.nix +++ b/Cargo.nix @@ -1179,7 +1179,7 @@ rec { }; "cert-tools" = rec { crateName = "cert-tools"; - version = "0.1.1"; + version = "26.3.0-rc1"; edition = "2021"; crateBin = [ { @@ -8108,7 +8108,7 @@ rec { }; "p12" = rec { crateName = "p12"; - version = "0.0.0-dev"; + version = "26.3.0-rc1"; edition = "2021"; src = lib.cleanSourceWith { filter = sourceFilter; src = ./rust/p12; }; authors = [ @@ -11676,7 +11676,7 @@ rec { }; "stackable-krb5-provision-keytab" = rec { crateName = "stackable-krb5-provision-keytab"; - version = "0.0.0-dev"; + version = "26.3.0-rc1"; edition = "2021"; crateBin = [ { @@ -11966,7 +11966,7 @@ rec { }; "stackable-secret-operator" = rec { crateName = "stackable-secret-operator"; - version = "0.0.0-dev"; + version = "26.3.0-rc1"; edition = "2021"; crateBin = [ { @@ -12151,7 +12151,7 @@ rec { }; "stackable-secret-operator-olm-deployer" = rec { crateName = "stackable-secret-operator-olm-deployer"; - version = "0.0.0-dev"; + version = "26.3.0-rc1"; edition = "2021"; crateBin = [ { @@ -12216,7 +12216,7 @@ rec { }; "stackable-secret-operator-utils" = rec { crateName = "stackable-secret-operator-utils"; - version = "0.0.0-dev"; + version = "26.3.0-rc1"; edition = "2021"; src = lib.cleanSourceWith { filter = sourceFilter; src = ./rust/utils; }; libName = "stackable_secret_operator_utils"; diff --git a/Cargo.toml b/Cargo.toml index ebeba896..2feea7be 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -4,7 +4,7 @@ default-members = ["rust/operator-binary"] resolver = "2" [workspace.package] -version = "0.0.0-dev" +version = "26.3.0-rc1" authors = ["Stackable GmbH "] license = "OSL-3.0" edition = "2021" diff --git a/deploy/helm/secret-operator/Chart.yaml b/deploy/helm/secret-operator/Chart.yaml index 921bb49b..a1b208ce 100644 --- a/deploy/helm/secret-operator/Chart.yaml +++ b/deploy/helm/secret-operator/Chart.yaml @@ -1,8 +1,8 @@ --- apiVersion: v2 name: secret-operator -version: "0.0.0-dev" -appVersion: "0.0.0-dev" +version: "26.3.0-rc1" +appVersion: "26.3.0-rc1" description: The Stackable Operator for Stackable Secret Operator home: https://github.com/stackabletech/secret-operator maintainers: diff --git a/docs/antora.yml b/docs/antora.yml index d522680b..dcbff1a3 100644 --- a/docs/antora.yml +++ b/docs/antora.yml @@ -1,3 +1,4 @@ --- name: home -version: "nightly" +version: "26.3" +prerelease: false diff --git a/extra/crds.yaml b/extra/crds.yaml index 79abcc4a..2ec2b574 100644 --- a/extra/crds.yaml +++ b/extra/crds.yaml @@ -21,13 +21,13 @@ spec: properties: spec: description: |- - A [SecretClass](https://docs.stackable.tech/home/nightly/secret-operator/secretclass) is a cluster-global Kubernetes resource + A [SecretClass](https://docs.stackable.tech/home/26.3/secret-operator/secretclass) is a cluster-global Kubernetes resource that defines a category of secrets that the Secret Operator knows how to provision. properties: backend: description: |- Each SecretClass is associated with a single - [backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend), + [backend](https://docs.stackable.tech/home/26.3/secret-operator/secretclass#backend), which dictates the mechanism for issuing that kind of Secret. oneOf: - required: @@ -41,7 +41,7 @@ spec: properties: autoTls: description: |- - The [`autoTls` backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend-autotls) + The [`autoTls` backend](https://docs.stackable.tech/home/26.3/secret-operator/secretclass#backend-autotls) issues a TLS certificate signed by the Secret Operator. The certificate authority can be provided by the administrator, or managed automatically by the Secret Operator. @@ -198,7 +198,7 @@ spec: A new certificate will be requested the first time it is used by a Pod, it will be reused after that (subject to cert-manager renewal rules). - [1]: https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend-certmanager + [1]: https://docs.stackable.tech/home/26.3/secret-operator/secretclass#backend-certmanager [cert-manager]: https://cert-manager.io/ properties: defaultCertificateLifetime: @@ -258,7 +258,7 @@ spec: type: object k8sSearch: description: |- - The [`k8sSearch` backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend-k8ssearch) + The [`k8sSearch` backend](https://docs.stackable.tech/home/26.3/secret-operator/secretclass#backend-k8ssearch) can be used to mount Secrets across namespaces into Pods. properties: searchNamespace: @@ -294,7 +294,7 @@ spec: type: object kerberosKeytab: description: |- - The [`kerberosKeytab` backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend-kerberoskeytab) + The [`kerberosKeytab` backend](https://docs.stackable.tech/home/26.3/secret-operator/secretclass#backend-kerberoskeytab) creates a Kerberos keytab file for a selected realm. The Kerberos KDC and administrator credentials must be provided by the administrator. properties: @@ -448,13 +448,13 @@ spec: properties: spec: description: |- - A [SecretClass](https://docs.stackable.tech/home/nightly/secret-operator/secretclass) is a cluster-global Kubernetes resource + A [SecretClass](https://docs.stackable.tech/home/26.3/secret-operator/secretclass) is a cluster-global Kubernetes resource that defines a category of secrets that the Secret Operator knows how to provision. properties: backend: description: |- Each SecretClass is associated with a single - [backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend), + [backend](https://docs.stackable.tech/home/26.3/secret-operator/secretclass#backend), which dictates the mechanism for issuing that kind of Secret. oneOf: - required: @@ -468,7 +468,7 @@ spec: properties: autoTls: description: |- - The [`autoTls` backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend-autotls) + The [`autoTls` backend](https://docs.stackable.tech/home/26.3/secret-operator/secretclass#backend-autotls) issues a TLS certificate signed by the Secret Operator. The certificate authority can be provided by the administrator, or managed automatically by the Secret Operator. @@ -625,7 +625,7 @@ spec: A new certificate will be requested the first time it is used by a Pod, it will be reused after that (subject to cert-manager renewal rules). - [1]: https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend-certmanager + [1]: https://docs.stackable.tech/home/26.3/secret-operator/secretclass#backend-certmanager [cert-manager]: https://cert-manager.io/ properties: defaultCertificateLifetime: @@ -685,7 +685,7 @@ spec: type: object k8sSearch: description: |- - The [`k8sSearch` backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend-k8ssearch) + The [`k8sSearch` backend](https://docs.stackable.tech/home/26.3/secret-operator/secretclass#backend-k8ssearch) can be used to mount Secrets across namespaces into Pods. properties: searchNamespace: @@ -721,7 +721,7 @@ spec: type: object kerberosKeytab: description: |- - The [`kerberosKeytab` backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend-kerberoskeytab) + The [`kerberosKeytab` backend](https://docs.stackable.tech/home/26.3/secret-operator/secretclass#backend-kerberoskeytab) creates a Kerberos keytab file for a selected realm. The Kerberos KDC and administrator credentials must be provided by the administrator. properties: @@ -890,13 +890,13 @@ spec: properties: spec: description: |- - A [TrustStore](https://docs.stackable.tech/home/nightly/secret-operator/truststore) requests information about how to - validate secrets issued by a [SecretClass](https://docs.stackable.tech/home/nightly/secret-operator/secretclass). + A [TrustStore](https://docs.stackable.tech/home/26.3/secret-operator/truststore) requests information about how to + validate secrets issued by a [SecretClass](https://docs.stackable.tech/home/26.3/secret-operator/secretclass). The requested information is written to a ConfigMap with the same name as the TrustStore. properties: format: - description: The [format](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#format) that the data should be converted into. + description: The [format](https://docs.stackable.tech/home/26.3/secret-operator/secretclass#format) that the data should be converted into. enum: - tls-pem - tls-pkcs12 diff --git a/rust/cert-tools/Cargo.toml b/rust/cert-tools/Cargo.toml index 91847f0b..7d2f9f22 100644 --- a/rust/cert-tools/Cargo.toml +++ b/rust/cert-tools/Cargo.toml @@ -1,7 +1,7 @@ [package] name = "cert-tools" description = "Merge multiple truststores encoded as PEM or PKCS12 into a JVM compatible format" -version = "0.1.1" # Managed by .scripts/release_cert-tools.sh +version = "26.3.0-rc1" authors.workspace = true license.workspace = true edition.workspace = true diff --git a/tests/release.yaml b/tests/release.yaml index ef1ad6e5..e8e1b071 100644 --- a/tests/release.yaml +++ b/tests/release.yaml @@ -7,8 +7,8 @@ releases: description: Integration test products: commons: - operatorVersion: 0.0.0-dev + operatorVersion: 26.3.0-rc1 secret: - operatorVersion: 0.0.0-dev + operatorVersion: 26.3.0-rc1 listener: - operatorVersion: 0.0.0-dev + operatorVersion: 26.3.0-rc1